{"vulnerability": "CVE-2025-0473", "sightings": [{"uuid": "e16c0bdd-3166-49b3-9df4-99f92b1632a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0473", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1950", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0473\n\ud83d\udd39 Description: Vulnerability in the PMB platform that allows an attacker to persist temporary files on the server, affecting versions 4.0.10 and above. This vulnerability exists in the file upload functionality on the \u2018/pmb/authorities/import/iimport_authorities\u2019 endpoint. When a file is uploaded via this resource, the server will create a temporary file that will be deleted after the client sends a POST request to \u2018/pmb/authorities/import/iimport_authorities\u2019. This workflow is automated by the web client, however an attacker can trap and launch the second POST request to prevent the temporary file from being deleted.\n\ud83d\udccf Published: 2025-01-16T13:09:14.896Z\n\ud83d\udccf Modified: 2025-01-16T13:09:14.896Z\n\ud83d\udd17 References:\n1. https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-pmb-platform", "creation_timestamp": "2025-01-16T13:55:54.000000Z"}, {"uuid": "720c898b-2416-472e-8b7e-543277a3edb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0473", "type": "seen", "source": "https://t.me/cvedetector/15582", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0473 - \"Persistent File Upload Vulnerability in PMB\"\", \n  \"Content\": \"CVE ID : CVE-2025-0473 \nPublished : Jan. 16, 2025, 1:15 p.m. | 40\u00a0minutes ago \nDescription : Vulnerability in the PMB platform that allows an attacker to persist temporary files on the server, affecting versions 4.0.10 and above. This vulnerability exists in the file upload functionality on the \u2018/pmb/authorities/import/iimport_authorities\u2019 endpoint. When a file is uploaded via this resource, the server will create a temporary file that will be deleted after the client sends a POST request to \u2018/pmb/authorities/import/iimport_authorities\u2019. This workflow is automated by the web client, however an attacker can trap and launch the second POST request to prevent the temporary file from being deleted. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T15:23:38.000000Z"}, {"uuid": "fe24f554-8365-4f45-8a1d-4c8c32cacc58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0473", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuegbg3ky2e", "content": "", "creation_timestamp": "2025-01-16T13:16:01.937536Z"}, {"uuid": "c28e3b25-df73-4cce-8217-6dd39374729e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0473", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113838214501625213", "content": "", "creation_timestamp": "2025-01-16T13:15:02.889941Z"}]}